Participants: Who Was There?

The following people participated in the SaTC Cyber Café (or registered for it). Check in regularly here to find possible research collaborators and learn more about people you were in conversation with.

If you participated in the SaTC Cyber Cafe, or are interested in being part of a collaborative research project and would like to be listed here, please introduce yourself using the form at the bottom of the page.

Jim Alves-FossUniversity of Idaho
email: jimaf at uidaho dot edu
url: http://www.csds.uidaho.edu
I am Director of the Center for Secure and Dependable Systems at the University of Idaho, and a Professor of Computer Science. My research interests are in the design, development and analysis of high assurance systems. I have a strong interest in formal methods, operating system and hardware security, and the mapping of high level security policies down into the low-level mechanisms that implement them. I have worked with cryptographic protocols, security for mobile networks and with language-based security issues. I am participating in this forum as a center director who is expanding an interdisciplinary team researchers interested in critical infrastructure security and the interplay of the technology support the infrastructure and the society it supports.

Nina AmlaNational Science Foundation

Mohd Anwar

Andrew Applebaum

Daniel Arista

Victor AsalState University of New Yorkemail: vasal at albany dot edu
url: http://www.albany.edu/rockefeller/faculty_pos_asal.shtml
I am interested in cross disciplinary research that focuses on getting a better understanding of the use of cyberspace as a platform for contentious politics by non-state actors and political coercion by state actors.

Vijay AtluriNational Science Foundation

Terrence AugustUniversity of California, San Diego
url: http://rady.ucsd.edu/~august
I study the economics of software security. Particularly, I develop models to better understand users purchasing and patching behavior, software firms’ investments in security and pricing to manage risk, and the role of government policy (i.e., software liability, patching rebates, etc.)

Adam AvivSwarthmore College
email: aviv at cs dot swarthmore dot edu
url: http://www.cs.swarthmore.edu/~aviv
Computer, Network, and Smartphone Security. Security perception. Graphical passwords. Human factors in security. I’m hoping to find collaborators in the social sciences who is interested in developing experiments in security perception, trying to answer the question: What criteria do people actual use when assessing their security?

George Avrunin

Rebecca (Becky) BaceUniversity of South Alabama
Research Interests: Though I’ve done a bit of work in intrusion detection, forensic testimony and other areas where the law and cyber security collide, my current areas of interest focus more on tech transfer of cyber technology to commercial markets. In particular, I’m interested in exploring how effective professions form and how they evolve to accommodate, embrace, or reject commercial products that ostensibly make practitioners more effective.

Elisa Bertino

Dina Biscotti

Matt BishopUC Davis

Marjory BlumenthalGeorgetown University

Dan BonehStanford University

Jeffrey M. Bradshaw

Richard BrooksClemson University
email: rrb at clemson dot edu
url: http:/www.clemson.edu/~rrb (My web site is out of date)
Have a number of research projects active: Timing side channels (including pattern extraction, hidden Markov models, probabilistic grammars); Game theory (including partially observable stochastic games and deception); Anti-censorship technologies for free press and democracy advocates (current focus West Africa); Denial of Service Attack analysis; Corporate data tracking; Authentication and authorization.
Am also interested in the social choice implied by current computer marketplace economics, which implicitly minimizes security. The ethical implications of our current software development laws are interesting.

Mike ByrneRice University
email: byrne at rice dot edu
url: http://chil.rice.edu/
I’m a human factors psychologist with significant cross-training in computer science. I’ve been working on the usability of voting systems for about six years now, and am interested in advancing computational approaches to usability evaluation such as ballot layout.

Lemuria CarterNorth Carolina A & T State University
email: Ldcarte2 at ncat dot edu
I am interested in exploring the factors that promote cyber security compliance in the workplace.

Sandra CarpenterUniversity of Alabama HuntsvilleDisclosure of private information: psychological cyber-attacks that can increase disclosure and cyber-mediated warnings to reduce disclosure.

Li-Chiou ChenPace University
email: lchen at pace dot edu
url: http://csis.pace.edu/~lchen/
My research interests have been focused on information security management and policy in order to mitigate cyber security threat and risk. In particular, I am interested in individual security risk perception, IT auditing and compliance, and web application vulnerability mitigation.

Yu Chen

Samuel Cheng
url: http://tulsagrad.ou.edu/samuel_cheng/home.html
I’m trained as an electrical engineering specializing in signal processing but am getting interested in privacy preserving data publishing and in particular the economic and policy aspect of it.

Yu Cheng

Amirhossein ChinaeiUPRM
email: ahchinaei at ece. dot prm dot edu
url: http://ece.uprm.edu/~ahchinaei/
I am an assistant professor at the University of Puerto Rico, Mayaguez. I obtained my PhD in computer science with a focus on database security from the University of Waterloo in Canada. My research interests fit in the areas of “access control” and “user privacy” with a focus on web applications. Two of my current research thoughts are as follow: I am investigating a platform by which users of different web applications can define their privacy concerns while complying with the corporate privacy policies; I am also exploring privacy-preserving extensions onto both traditional and contemporary data representation languages, such as SQL, XML, XQuery, JSON, etc. I do welcome collaborations.

Michael CliffordUC Davis
My research interests include problems in information security, especially those related to trust, authentication, identity, anonymity, distributed systems, and mobile devices. I am also interested in reducing the energy consumption of computing devices, including servers, desktops, and mobile devices.

George Corser
Oakland University
email: gpcorser at oakland dot edu
url: http://secs.oakland.edu/~gpcorser
George Corser is a PhD student in Oakland University’s Computer Science and Engineering department. His research focus centers on digital privacy, esp. in vehicular ad-hoc networks (VANETs). An ancillary interest is in private communications for deaf, heard-of-hearing and other people who communicate using ASL (American Sign Language). Corser is seeking collaborations with professionals in philosophy, psychology, law/criminal justice and sociology to measure the effects and practicalities of privacy systems and technologies. If you or a colleague would like to discuss please email me.

Jonathan Crabtree

Lorrie CranorCarnegie Mellon University

Ram Dantu

Dipankar Dasgupta

Alfonso De GregoriosecYOUre Consulting
adg at crypto dot lo dot gy
url: http://beewise.com/
I’m founder of BeeWise cybersecurity prediction market and my research interests are at the intersection of software security and economics. BeeWise is a ﬁrst testbed for a security-event futures exchange. The project is aimed towards researching and building a financial instrument useful in balancing the information between buyers and sellers in the security market, providing manufacturers with incentives to build security in, and consumers a way to hedge against security risks. This Cyber Café is an excellent opportunity for me to learn from you. And I’m looking forward to new collaboration opportunities. Thank you.

Robert DickUniversity of Michigan
email: dickrp at umich dot edu
url: http://robertdick.org
Censorship-resistant communication in infrastructureless and infrastructure-based environments. Interaction between technology and human behavior in secure communication systems. Making censorship-resistance, anonymity, security, and other properties accessible to those without special training. See http://whispercomm.org/

Jeremy EpsteinNational Science Foundation
email: jepstein at nsf dot govurl: http://www.nsf.govI’m the program officer for the NSF Secure and Trustworthy Cyberspace (SaTC) program. I’m on loan to NSF from SRI International, where I did research in security of voting systems – an inherently interdisciplinary field. I’m looking forward to seeing lots of productive collaborations coming out of the Cyber Cafe – see this page for the SaTC solicitation and deadlines.

Raquel HillIndiana University
url: http://www.cs.indiana.edu/~ralhill
My primary research interests are in the areas of trust and security for distributed computing environments and privacy of medical related data.

Janine Hiller

Chris HinnantFlorida State University
I’m primarily interested in issues related to the development and adoption of ICT by large government organizations. I’m also interested in the policies that must be developed in order to balance both the user and institutional needs pertaining to privacy and security.

Shuyuan Mary Ho

Steven HofmeyrLawrence Berkeley National Laboratory
url: http://ftg.lbl.gov
Using modeling approaches (especially agent-based modeling) to study the impact of malicious elements and chronic attacks on the growth of large-scale complex systems, such as the Internet. Understanding how high-level policies help secure those systems, and how economic incentives and drivers affect the outcome.

Fei HuUniversity of Alabamaemail: fei at eng dot ua dot edu
url: http://feihu.eng.ua.edu
I am doing research on medical security and privacy (including implantable medical device security), cyber-physical system security, and cognitive radio network security. I would like to collaborate with experts in social and economics security.

Tom HurleyThomas J. Hurley and Associates / Oxford Leadership Academyemail: thomasjhurley at gmail dot com
I’m a consultant specializing in the design and implementation of collaborative processes for leadership, organization, and community development. I’m delighted to help facilitate this Cyber Cafe and look forward to a series of productive, dynamic conversations throughout the day.

Matt JonesThe University of Alabama in Huntsville
Hi, I am a graduate student working under Dr. Carpenter on teamwork and cyber security. I am interested in identity theft, mindlessness attacks, and effective strategies to counter these.

Amy LenzoweDialogue
email: amy at wedialogue dot com
url: http://www.wedialogue.com
I design, host and produce interactive online events. It’s a pleasure to be working with Karl Levitt and SaTC on this Cyber Café, and I look forward to supporting new collaborations and projects that may come from it.

Feng LiPurdue School of Engineering and Technology, IUPUI
email: fengli at iupui dot edu
url: http://www.engr.iupui.edu/~fengli/
My current research interests including moving target defense, BYOD smartphone security, and collaborative malware containment. I am looking forward to collaborative opportunities with researchers with expertise in the intersection of cyber security and social and economic issues.

Yun LiUniversity of California, Davis

Leszek Lilien

Heather LipfordUniversity of North Carolina at Charlotte
I do research in the area of usable security and privacy, particularly privacy on social network sites.

Kevin McCabeGeorge Mason University
email: kmccabe at gmu dot edu
url: http://www.neuroeconomics.us
I am in the economics department at GMU. My research interests are in the use of the experimental method to economics questions. My experiments are largely done in the laboratory and include, experimental economics, behavioral economics, neuroeconomics, and virtual world experiments. My current research topics includes the experimental study of the mutli-tasking principal-agent problem as it applies to the motivations and incentives for the cybersecurity practices of participants in organizations.

Nasir Memon

Jelena Mirkovic

Tyler MooreSouthern Methodist University
email: tylerm at smu dot edu
url: http://lyle.smu.edu/~tylerm/
My research focuses on the economics of information security, the study of electronic crime, and the development of policy for strengthening security. I’m based in a computer science department, but my research straddles computer science and econometrics.

Jose A. Morales

Peter MuhlbergerNational Science Foundation

Dhiraj MurthyBowdoin College
email: dmurthy at bowdoin dot edu
url: http://www.bowdoin.edu/faculty/d/dmurthy/
I am a Sociologist who researches emergent social media. My current research explores social media, virtual organizations, big data quantitative analysis, and social networking technologies in virtual breeding grounds. I employ a mixed methods approach using qualitative and quantitative methods.

Lee OsterweilUniversity of Massachusetts
email: lj at cs dot umass dot edu
url: http://laser.cs.umass.edu
Continuous improvement of processes such as elections, by first defining these processes, and then applying rigorous analysis of these definitions to identify defects and vulnerabilities.

Indrajit RayColorado State University
email: indrajit at cs dot colostate dot edu
url: http://www.cs.colostate.edu/~indrajit
Research Interests: My interests are in security risk modeling and estimation, trust models, privacy and security protocols. One of my current works looks into the nature of risk inherent in normal activity on the Internet, the perception of those risks, and the judgment about trade-offs in behavior. I am working with researchers in Psychology in human behavior modeling. The key insight is that adequate security and privacy protection requires the concerted efforts of both the information system and the user(s) using it. We are trying to build predictive security models for end users. I am interested in investigating economic models of attackers that will allow us to anticipate different attacker strategies and how that can be tied back to the end-user model.

Sachin ShettyTennessee State University
url: http://faculty.tnstate.edu/sshetty
My research interests lie at the intersection of computer networking, network security and machine learning. My current research projects deal with moving target defense, IP geolocation and security of mobile cyber physical systems. I am looking forward to collaborative opportunities with researchers with expertise in the intersection of cyber security and social and economic issues.

Eugene H. SpaffordPurdue University
emai: spaf at purdue dot edu
url: http://spaf.cerias.purdue.edu
I am the executive director of CERIAS at Purdue — a multidisciplinary research center in cybersecurity, privacy and cybercrime. We have over 80 affiliated faculty in 20 academic departments.

My current interests relate to policies around security, to effective deterrence, and to CI methods and mechanisms. Over a span of 30 years I’ve worked in a lot of subfields of security, and am still interested in most of them (although I am not fully current with most of them).

Anna Squicciarini

Susan SquiresUniversity of N. Texas
email: Susan dot Squires at UNT dot edu
Before joining UNT’s department of anthropology, I worked at the intersecton of technology innovation and human factors -communities of scientific practice, social network analysis and HCI. Between 2004-2007 I was part of a DARPA funded research project as co-investigator for requirements research I helped redefined how we think about the workflow of computational scientists. Publications arising from this work include among others
2010 Faulk, Stuart, Susan Squires, Michael Van de Vanter, and Larry Votta. Understanding the Productivity Gridlock in Scientific Computing (and How Software Engineering Can Help). IEEE SW Special Issue on Developing Scientific Software.
2010 Kendall, Richard, Andrew Mark, Susan Squires and Christine Halverson. Condor: Case Study of a Large-scale, Physics-based Code Development Project, Computing in Science & Engineering, 12(3) 22-27.

Doug SteigerwaldEconomics, UC Santa Barbara
email: doug at econ dot ucsb dot edu
url: http://www.econ.ucsb.edu/~doug/
I have worked on problems at the interface of economics and computer security with specific focus on the underground economy on the internet. Previous questions: how credit card companies can identify fraudulent service providers (specifically fraudulent anti-virus providers), how fraudulent financial information (gathered via Torpig) is sold and how to combat fraudulent advertising “clicks”. A current topic of interest is how to best combat counterfeiters who distribute physical products through fraudulent websites.

Salvatore StolfoColumbia University
email: sal at cs dot columbia dot edu
url: http://www.cs.columbia.edu/~sal
Insider Threats, Scalable Deception and Active Defenses ; (Embedded System Insecurity is an entirely different research topic I am steeped in) A number of goals in my research include designing effective deception technology to deceive adversaries to a) make them consume their own resources without successfully exfiltrating sensitive information and b) “encourage” them to make mistakes and reveal information about themselves, their intent and their motives. Behavior modeling and analytics plays a prominent role in this line of research and is an area social scientists can make substantive contributions.

Besiki Stvilia

K. Subramani

Kevin Tambara

Qian Tang

Casey ThomasUniversity of Alabama, Huntsville
I’m a Masters Experimental Psychology student working under Dr. Sandra Carpenter on the the cyber-security projects at UAH.

Kevin ThompsonNational Science Foundation

Rahul TelangCarnegie Mellon University
email: rtelang at andrew dot cmu dot edu
url: http://www.heinz.cmu.edu/~rtelang/rahul_res.html
How market structure and competition affect (or does not) security and privacy outcomes (for users and for firms). What is the role of regulations and how effective are they? Interested in empirical and analytical models.

Sam WeberNational Science Foundationemail: sweber at nsf dot gov
I am a Program Director of NSF’s Secure and Trustworthy Cyberspace program. I obtained my PhD in Computer Science with a minor in Psychology. Currently my research interests primarily lie in security engineering, including the human aspects of system design and programming.

Von Welch

Susanne Wetzel

Andrew Whinston

Laurie Williams

Rebecca WrightRutgers University

Dinghao WuPennsylvania State University
email: dwuat ist dot psu dot edu
url: http://faculty.ist.psu.edu/wu/
I do research on software systems, including software security, analysis, and verification, information and software assurance, programming languages, and software engineering. I also have an interest in privacy.

Li XiongEmory University
url: http://www.mathcs.emory.edu/~lxiong
My research interests are in data privacy and security with applications in medical informatics, participatory sensing, cloud computing, and location based services.

Heng XuThe Pennsylvania State University
email: hxu at ist dot psu dot edu
url: http://faculty.ist.psu.edu/xu/index.html
My current research focus is on the interplay between social and technological issues associated with information privacy. My research projects have been dealing with users’ information privacy concerns and behaviors, strategic management of organizational privacy and security practices, and design and empirical evaluations of privacy-enhancing technologies.

Chuan YueUniversity of Colorado Colorado Springs
email: cyue at uccs dot edu
url: http://www.cs.uccs.edu/~cyue/
Research interests, and any collaborative research projects you’d like to pursue.: I’m doing research on Web security and privacy. I hope to learn from you and find some good collaboration opportunities. Thanks.

Ben Zhao

Lina Zhou

Feng Zhu

Ye Zhu

Lisa Pytlik ZilligUniversity of Nebraska, Lincoln

Saman Zonouz

Lenore Zuck

Register Your Interest

Whether or not you were able to join us for the SaTC Cyber Café, we invite you to continue to explore collaborative research possibilities between computer science and the social sciences by registering your interest in the breakout session pages, and find potential collaborators in the list of participants.